0% found this document useful (0 votes)
12 views9 pages

Gpa - by - Blockchain Technology

This document discusses a graphical password authentication system that utilizes blockchain technology to enhance security compared to traditional text-based passwords. It outlines the limitations of existing systems and proposes a new method called Keyed Click Point (CCP), which allows users to select specific click points on images to create passwords. The study concludes that graphical passwords are more memorable and secure, effectively reducing risks associated with various types of attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views9 pages

Gpa - by - Blockchain Technology

This document discusses a graphical password authentication system that utilizes blockchain technology to enhance security compared to traditional text-based passwords. It outlines the limitations of existing systems and proposes a new method called Keyed Click Point (CCP), which allows users to select specific click points on images to create passwords. The study concludes that graphical passwords are more memorable and secure, effectively reducing risks associated with various types of attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

e-ISSN: 2582-5208

International Research Journal of Modernization in Engineering Technology and Science


( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com

GRAPHICAL PASSWORD AUTHENTICATION USING BLOCKCHAIN


TECHNOLOGY
Vishal Saibanna Mali*1, Pravin Santosh Mishra*2, Yashraj Mahesh Patil*3,
Siddhesh Khanvilkar*4
*1,2,3,4Pillai HOC College Of Engineering And Technology, India.
DOI : https://www.doi.org/10.56726/IRJMETS35541
ABSTRACT
The graphical password systems, a replacement for the conventional alphanumeric username and password
authentication mechanism, are the subject of this article. The latter has been shown to have serious
disadvantages, such as users' propensity to select simple passwords or forget difficult ones. Images are used as
passwords in graphic password systems, and this page gives a thorough description of the approaches
currently being used in this field. The methods are divided into two groups: approaches based on detection and
those based on memory. Further research directions are given along with discussions of the benefits and
drawbacks of each technique. As well as discussing the key problems with the design and implementation of
graphical password systems, the article discusses the security of graphical passwords in comparison to text
passwords. Researchers and information security experts interested in investigating password-based
authentication solutions should find this study informative. The Keyed Click Point (CCP) graphical password
system, which requires the user to interact with a series of five images by clicking on specified locations, is the
subject of the article. This system's objective is to increase security while utilizing a straightforward, strategy
that is hard for hackers to figure out. New technologies like email and mobile phones are linked to the CCP.
I. INTRODUCTION
Web authentication at first only used text passwords. The fact that this system was insecure and simple to hack,
however, made it troublesome. Users also had to remember numerous passwords, which was a difficult chore.
Biometric authentication, QR codes, and mobile two-step verification technologies were introduced to address
the shortcomings of the text password approach. These substitutes, however, were costly and sparsely
accessible. Graphical password authentication systems were developed to solve these problems. These systems
employ photos, which the user chooses via a graphical user interface and arranges in a particular arrangement.
The "hot spot" issue was one of the issues with the first graphical password systems. The Pass Point method,
which requires the user to click on five dots on a single image in a certain order to establish a password, was
developed to address this problem. Users will find this system to be secure and simple to remember. In general,
graphical password systems offer a more advantageous substitute for text passwords and conventional
authentication methods.
II. EXISTING SYSTEM
Using pictures or drawings instead of words makes them easier to remember than words since individuals are
better at recalling pictures. Moreover, graphical passwords give higher protection against brute-force assaults
due to the bigger search space. The two primary categories of graphical password approaches are often
recognition-based and recall-based strategies. Recognition-based strategies entail challenging the user to
recognize certain images that were picked during registration. Recall-based strategies, on the other hand,
demand that the user duplicate an action they previously took or a choice they made during registration. Users
are authenticated using Pass faces, an example of a recognition-based method, based on their capacity to
recognize human faces. Greg Blonder's 1996 idea for a recall-based graphical password method is another
illustration. In this method, users construct passwords by clicking on different parts of an image, then verify
themselves by clicking on the same places. Blonder's concept is expanded upon and some of its drawbacks are
addressed in Pass Points.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[991]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com
III. LIMITATIONS OF THE EXISTING SYSTEM
Recalling images in a specific order can be challenging. As with any system, the proposed method also has its
own limitations. One of these limitations is its basic and unappealing interface, which is designed solely for user
authentication purposes. The interface is uncomplicated, consisting of only two fields for the user to enter their
username and email, choose an image for their password, and click the submit button. The project's sole focus
is on verifying a user's identity by utilizing a graphical password with a passphrase authentication system.
IV. PROPOSED SYSTEM
The aim of our system was to overcome the drawbacks associated with traditional web authentication
methods, such as password cracking and the inconvenience of remembering multiple passwords for various
accounts. We have devised a user-friendly graphical password system that is easy to remember and recognize,
but challenging for hackers to break into. Our system employs an advanced click-point method and mail alert
system to identify and notify users of potential security risks. When an unauthorized attempt is detected, we
send email notifications without revealing the hacker's identity. The CCP system is a recognizable, clickable,
graphical password verification system that is easy to use and secure. The system produces passwords based
on the user-selected click spots on the image along the x and y axes, using the RGB values of those points to
determine the password. Users have the option of selecting one image from an existing database or many
photographs in different formats. The system generates a text password for the user to enter upon login based
on the RGB values of the chosen click points during registration. Security is improved by the second-level key
click-point approach. Also, if a hacker attempts to crack the system and enters the erroneous click points three
times, a warning message is delivered to the user's mobile device to inform them. Despite the system's many
benefits, it has one drawback: because we put more emphasis on authentication than interface design, it lacks
aesthetic appeal.
V. METHODOLOGY
A graphical user interface (GUI) is necessary for a graphical authentication system in order for users to interact
with it and carry out required tasks. For the purposes of this study, the GUI is situated on the client side of the
system architecture and interacts directly with users while also permitting connection with the blockchain on
the server side. The Interface was created using the HTML/CSS programming language, with JavaScript changes
included for dynamic operations like picture splitting and selection. The initial page of the suggested system,
titled "Registration," has three fields for collecting user data in general and a username. The page offers various
categories of images, and the study suggests that images of recognizable people may be easier to remember as
passwords. The user can select at least four images, and for each image, the user must select specific split parts,
with the data stored on the blockchain. To prevent certain attacks, such as shoulder attacks, during login
sessions, the user's selected image passwords have reduced opacity.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[992]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com
VI. FLOWCHART

Figure 1: Flow Chart of The Working Model

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[993]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com
VII. DEPLOYMENT DIAGRAM

Figure 2: Deployment Diagram of The Working Model


VIII. RESULT

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[994]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[995]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[996]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[997]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com

IX. CONCLUSION
Based on the results of studies on human psychology, graphical passwords are more easily recalled by the
human brain compared to text-based passwords. Moreover, users can recognize pictorial passwords. Our
proposed system was successfully implemented and tested, and as a result, we came to the conclusion that a
graphical password authentication system is very efficient, secure, and adaptable. This system is also cost-
effective compared to a biometric system. Our project's analysis has shown that the security measures we
implemented, such as secret passwords, click points, and shuffling, provide a higher level of security. By using a
graphical password system, we can minimize the risk of attacks, brute-force attacks, guessing attacks, and
shoulder-surfing attacks, among others. Because graphical representations are easier to remember than text-
based passwords, graphic passwords are a valuable tool.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[998]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:04/April-2023 Impact Factor- 7.868 www.irjmets.com
ACKNOWLEDGEMENT
We are very appreciative of Prof. Siddhesh Khanvilkar’s support, which has included both technical and
emotional assistance as well as helpful mentoring. At every level of the project, our guide has also been really
helpful in offering us excellent counsel and worthwhile suggestions. We would want to take this chance to say
thank you to Dr. Divya Chirayil, Director of Information Technology, for inspiring us and giving us crucial
support. Without expressing our gratitude to the department's teaching and non-teaching staff members who
have so generously supported us, our acknowledgment would be lacking, as we are aware. The Principal of The
Pillai HOC College of Engineering and Technology in Rasayani, Dr. J.W. Bakal, is thanked for his cooperation.
X. REFERENCES
[1] Vaibhav Moraskar, Sagar Jai Kalyani, Mujib Saiyyed, Jaykumar Gurnani, Kalyani Pendke, “Cued Click
Point techniques for graphical password authentication,” International Journal Of Computer Science
And Mobile Computing, Vol.3 Issue.1, January- 2014, pg. 166-172.
[2] Ian Jermyn, Alain Mayer, Fabin Monrose, Michael K. Reither, Aviel D. Rubin “The design and analysis of
graphical passwords”, Proceeding of The 8th UNISEX Security Symposium, 1999.
[3] Vashek Mathyas, Zdenek Riha, “Security of biometric authentication system,” International Journal of
Computer Information System and Industrial Management Application, 2011.
[4] Iranna A. M., PankajaPatil, “Graphical password authentication using persuasive cued click point,”
International Journal Advanced Research in Electrical Instrumentation Engineering, July 2013.
[5] Suo, Ying Zhu, G. Scott,Owen Xiaoyuan, “Graphical passwords: a survey”,(Department of Computer
Science Georgia State University).
[6] P. R. DaveleShrikala M. Deshmukh, Anil B. Pawar, “Persuasive Cued Click Points with click draw based
graphical password scheme”, International Journal of Soft Computing and Engineering (IJSCE), May
2013.
[7] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, “PassPoints: Design and longitudinal
evaluation of a graphical password system,” International Journal of Human-Computer Studies, 2007.
[8] Antonella De Angeli, Lynne Coventry, Graham Johnson, and Karen Renaud. Is a picture really worth a
thousand words? exploring the feasibility of graphical authentication systems. International Journal of
Human-Computer Studies, 63:128–152, July 2005.
[9] Real User Corporation. The science behind passfaces, June 2004.
[10] G. E. Blonder. Graphical password. U.S. Patent 5559961, Lucent Technologies, Inc. (Murray Hill, NJ),
August 1995.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[999]

You might also like